+ All Categories
Home > Documents > ATIS 2015 Organization Beijing, China November 4-6, 2015Professor Ding deals with Secure Key...

ATIS 2015 Organization Beijing, China November 4-6, 2015Professor Ding deals with Secure Key...

Date post: 06-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
12
ATIS 2015 Conference Program The 6th International Conference on Applications and Techniques for Information Security Sponsored By ATIS 2015 Organization Beijing, China November 4-6, 2015
Transcript
Page 1: ATIS 2015 Organization Beijing, China November 4-6, 2015Professor Ding deals with Secure Key Exchange based on LWE. These two speeches are both related to Information Security, and

ATIS 2015

Conference Program

The 6th International Conference on Applications and

Techniques for Information Security

Sponsored By

ATIS 2015 Organization

Beijing, China

November 4-6, 2015

Page 2: ATIS 2015 Organization Beijing, China November 4-6, 2015Professor Ding deals with Secure Key Exchange based on LWE. These two speeches are both related to Information Security, and

2

CONTENTS

Welcome to ATIS-2015 ......................................................... 3

Organization .......................................................................... 4

ATIS-2015 SCHEDULE ........................................................... 7

Page 3: ATIS 2015 Organization Beijing, China November 4-6, 2015Professor Ding deals with Secure Key Exchange based on LWE. These two speeches are both related to Information Security, and

3

Welcome to ATIS-2015

As Steering Committee Chair of the sixth International Conference on Applications

and Techniques in Information Security, it is my pleasure to welcome all participants,

especially those whose papers have been chosen to appear in the Conference

proceedings, but also those members of the Programme Committee who made

insightful and constructive comments on the submissions, and those members of the

audience who prompted speakers into thinking about how their work might be

extended.

It is a great honour to host our Keynote Speakers, Professor C.Pandu Rangan from

IIT Madras, India and Professor Jintai Ding from the University of Cincinnati, USA.

The speech of Professor Rangan concerns memory scrapper attacks, while that of

Professor Ding deals with Secure Key Exchange based on LWE. These two speeches

are both related to Information Security, and they exhibit research contents of Security

from different aspects in current times.

I appreciate deeply the time the very busy members of the Programme Committee

have spent on this conference. They are helping ATIS to move to ever greater

excellence.

Special thanks are due to our Honorary Chairs Li Guo and Zhen Han, Conference

Co-Chairs Professor Jiqiang Liu and Jianlong Tan, Programme Committee Co-Chairs,

Dr. Wenjia Niu and Gang Li, for their outstanding work in negotiating with our

publisher Springer, and in organizing the submission and reviewing system.

Finally, no conference can be a success without a dedicated local organization team,

and I must offer heartfelt gratitude to our Conference Secretary Wei Wang and Shaowu

Liu.

We all hope that you enjoy ATIS-2015 and will return for ATIS-2016.

With Best Wishes

Lynn Margaret Batten, FACS, GAICD

Senior Member, IEEE

Director of the Securing Cyberspace Laboratory,

School of Information Technology

Deakin University, Melbourne, Australia

Page 4: ATIS 2015 Organization Beijing, China November 4-6, 2015Professor Ding deals with Secure Key Exchange based on LWE. These two speeches are both related to Information Security, and

4

Organization

Programme Committee

The Programme Committee was responsible for the scientific content of ATIS 2015. It

prepared the final list of conference topics, invited speakers, and refereed accepted

papers. The Programme Committee consists of:

Guoyong Cai Guilin University of Electronic Technology, China

Lang Chang Guilin University of Electronic Technology, China

Changed Zhang Southwest Jiaotong University, China

Heejo Lee Korea University, Korea

John Yearwood Deakin University, Australia

Jiaxin Han Xi'an Shiyou University, China

Kwangjo Kim KAIST, Korea

Kui Ren University of Buffalo, U.S.

Lei Pan Deakin University, Australia

Leila Batina Radboud University, The Netherlands

Liehuang Zhu Beijing Institute of Technology, China

Qingyun Liu Institute of Information Engineering, Chinese Academy of

Sciences, China

Rafiqul Islam Charles Sturt University, Australia

Morshed Choudhury Deakin University, Australia

Matthew Warren Deakin University, Australia

Ping Xiong Zhongnan University of Economics and Law, China

Sheng Zhong Nanjing University, China

Jinqiao Shi Institute of Information Engineering, Chinese Academy of

Sciences, China

Zhongzhi Shi Institute of Computing Technology, Chinese Academy of

Sciences, China

Page 5: ATIS 2015 Organization Beijing, China November 4-6, 2015Professor Ding deals with Secure Key Exchange based on LWE. These two speeches are both related to Information Security, and

5

Steve Versteeg CA, Australia

Tianqing Zhu Deakin University, Australia

Tingshao Zhu Institute of Psychology, Chinese Academy of Sciences, China

Wei Ren China University of Geosciences, China

Xiaofeng Wang Siemens Research

Gang Xiong Institute of Information Engineering, Chinese Academy of

Sciences, China

Rui Xue Institute of Information Engineering, Chinese Academy of

Sciences, China

Xun Yi RMIT University

Fei Yan School of Computer, Wuhan University, China

Yuan Zhang Nanjing University, China

Yongbin Zhou Institute of Information Engineering, Chinese Academy of

Sciences, China

Organizing Committee

The organizing committee was responsible for functional organization of ATIS 2015,

including the selection of the most suitable locations, preparation of the Website and

conference programme, arrangement of the social programme, production and

publication of the proceedings volume, coordinating the contact between invited

speakers, authors, participants, sponsors and publishers.

The Organizing Committee consists of:

Steering Committee

Chair

Lynn Batten (Deakin University, Australia)

Honorary Chairs: Li Guo (Chinese Academy of Sciences, China)

Zhen Han (Beijing Jiaotong University, China)

Conference Co-Chairs Jiqiang Liu (Beijing Jiaotong University, China)

Jianlong Tan (Chinese Academy of Sciences, China)

Page 6: ATIS 2015 Organization Beijing, China November 4-6, 2015Professor Ding deals with Secure Key Exchange based on LWE. These two speeches are both related to Information Security, and

6

Program Committee

Co-Chairs

Wenjia Niu (Chinese Academy of Sciences, China)

Gang Li (Deakin University, Australia)

Local Organization

Committee

Yongzhong He (Beijing Jiaotong University, China)

Wei Wang (Beijing Jiaotong University, China)

Conference Secretary Wei Wang (Beijing Jiaotong University, China)

Shaowu Liu (Deakin University, Australia)

Sponsors

We would like to thank the following institutions for sponsoring the ATIS 2015 with

financial and technical resources:

Beijing Jiaotong University, China

Deakin University, Australia

Institute of Information Engineering, Chinese Academy of Sciences, China

TULIP Lab, Deakin University, Australia

Beijing Universal Cloud Data Analytics Technology, China

Page 7: ATIS 2015 Organization Beijing, China November 4-6, 2015Professor Ding deals with Secure Key Exchange based on LWE. These two speeches are both related to Information Security, and

7

ATIS-2015 SCHEDULE

November 3 (Tuesday), 2015

14:00-18:00 Registration

Location: 1st Floor of Machine Building (机械楼一层)

November 4 (Wednesday), 2015 @Beijing Jiaotong University

9:00-9:20 Opening ATIS-2015 Conference Chair: Prof. Jiqiang Liu

ATIS-2015 Program Committee Co-Chair: Dr. Gang Li

Location: Academic Reporting Hall,2nd Floor of Machine Building (学术报告厅,机械楼

二层)

9:20-10:20 Invited Talk Memory Scrapper Attacks - Threats and Mitigations

Prof.C.Pandu Rangan, Fellow, Indian National Academy of Engineering Introduced by Dr Gang Li, Deakin University

Location: Academic Reporting Hall,2nd Floor of Machine Building (学术报告厅, 机械

楼二层)

10:20-11:20 Invited Talk A simple and provable secure (Authenticated) Key Exchange based on LWE

Prof. Jintai Ding, University of Cincinnati, U.S. Introduced by Prof. Jiqiang Liu,Beijing Jiaotong University

Location: Academic Reporting Hall,2nd Floor of Machine Building (学术报告厅,机械楼

二层)

11:20-11:50 Group Photo

Location: Academic Reporting Hall,2nd Floor of Machine Building (学术报告厅,机械楼

二层)

12:00-13:00 Lunch Location: Hongguoyuan Hotel

Page 8: ATIS 2015 Organization Beijing, China November 4-6, 2015Professor Ding deals with Secure Key Exchange based on LWE. These two speeches are both related to Information Security, and

8

13:30-17:20 Sessions&Discussions (The 4th and 5th Meeting Room)

===================================================

At the 4th Meeting Room

Session Chair: Wei Wang

Category: Cryptography

13:30-13:55 An Image Encryption Algorithm based on Zigzag Transformation

and 3-Dimension Chaotic Logistic Map Yuzhen Li, Xiaodong Li, Xin Jin, Geng Zhao, Shiming Ge, Yulu Tian, Xiaokun Zhang, Kejun

Zhang, Kejun Zhang

13:55-14:20 An Improved Cloud-Based Revocable Identity-Based Proxy

Re-encryption Scheme Changji Wang, Jian Fang, Yuan Li

14:20-14:45 Cryptographic Public Key Length Prediction

M. Amain and L.M. Batten

14:45-15:10 An image encryption algorithm based on Chua’s chaos and Baker’s

transformation Chupei Chen, Jing Li, and Hongmin Deng

15:10-15:40 Coffee Break

15:40-16:05 Quantum differential cryptanalysis to the block ciphers

Hongwei Li,Li Yang

16:05-16:30 An Enhanced Authentication Scheme for Virtual Private Network

Access based on Platform Attributes of Multi-level Classification

Xun Chen, Jiqiang Liu, Yanfeng Shi, and Zhen Han

16:30-16:55 Public Key Timed-Release Attribute-Based Encryption Ke Yuan, Nan Shen,Yonghang Yan, Zheli Liu,Chufu Jia

16:55-17:20 Color Image Encryption in CIE L*a*b* Space

Xin Jin, Yingya Chen, Shiming Ge, Kejun Zhang, Xiaodong Li, Yuzhen Li, Yan Liu, Kui

Guo, YuluTian, GengZhao, Xiaokun Zhang, Ziyi Wang

===================================================

Page 9: ATIS 2015 Organization Beijing, China November 4-6, 2015Professor Ding deals with Secure Key Exchange based on LWE. These two speeches are both related to Information Security, and

9

===================================================

At the 5th Meeting Room

Session Chair: Yanan Cao

Category: Trust Computing and Privacy Protection

13:30-13:50 Structural Analysis of IWA Social Network Wenpeng Liu, Yanan Cao, Diying Li, Wenjia Niu, Jianlong Tan, Yue Hu, Li Guo

13:50-14:10 A Differentially Private Method For Reward-Based Spatial

Crowdsourcing Lefeng Zhang, Xiaodan Lu, Ping Xiong, Tianqing Zhu

14:10-14:30 Do Applications Perform its Original Design? A Preliminary

Analysis from Internet Big Data Lei Qian, Yinlong Liu, and Yanfei Zhang

14:30-14:50 Trust Prediction With Trust Antecedent Framework Regularization

Haiyang He, Yong Wang, Guoyong Cai

14:50-15:10 Trust Prediction based on Interactive Relationship Strength

Guoyong Cai, Liyuan Wang, Haiyang He

15:10-15:40 Coffee Break

Session Chair: Gang Xiong

Category: Evaluation, Standards and Protocols

15:40-16:05 Discover Abnormal Behaviors Using HTTP Header Fields

Measurement Quan Bai, Gang Xiong, Yong Zhao, Zhenzhen Li

16:05-16:30 Reconstruction of Potential Attack Scenarios of the OpenID

Protocol Towards Network Forensics Analysis Dongyao Ji, Junliang Liu, and Gang Yao

16:30-16:55 A Lightweight Code-based Authentication Protocol for RFID

Systems Zhuohua Liu, Wei Zhang, Chuankun Wu

16:55-17:20 An Overview of Ad Hoc Network Security FanYang,Yulan Zheng, Ping Xiong

Page 10: ATIS 2015 Organization Beijing, China November 4-6, 2015Professor Ding deals with Secure Key Exchange based on LWE. These two speeches are both related to Information Security, and

10

===================================================

17:30 Conference dinner Location: Hongguoyuan Hotel

November 5 (Thursday), 2015 @ Beijing Jiaotong University

8:30-12:10 Sessions&Discussions (The 4th and 5th Meeting Room)

===================================================

At the 4th Meeting Room

Session Chair: Xiaojun Chen

Category: Tools and Methodologies

8:30-8:55 RICS-DFA: Reduced Input Character Set DFA for Memory-efficient

Regular Expression Matching Qiu Tang, Lei Jiang, Qiong Dai, Majing Su, and Hongtao Xie

8:55-9:20 A Clustering Approach for Detecting Auto-Generated Botnet Domains Pu Yang, Xiaojun Chen, Yiguo Pu, JinQiao Shi

9:20-9:45 Modeling of Mobile Communication Systems by Electromagnetic

Theory in the Direct and Single Reected Propagation Scenario Guo Sheng, Shuping Dang, Nadim Hossain, and Xu Zhang

9:45-10:10 Bayesian Reliability Assessment Method for Single NC Machine

Tool under Zero Failures Hongzhou Li, Fei Chen, Zhaojun Yang, Yingnan Kan, Liding Wang

10:10-10:30 Coffee Break

10:30-10:55 MIRD: Trigram-based Malicious URL Detection Implanted with

Random Domain Name Recognition Xiong Cuiwen, Li Pengxiao, Zhang Peng, Liu Qingyun, Tan Jianlong

10:55-11:20 A Novel NB-SVM-based Sentiment Analysis Algorithm in

Cross-cultural Communication Yuemei Xu, Zihou Wang, Yuji Chen

11:20-11:45 Time-varying Impulsive Anticontrol of Discrete-time System Qian Wang, Wei Xiong,Ya Shuang Deng

11:45-12:10 Leakage Prevention Method for Unstructured Data Based on

Classification Hao Li, Zewu Peng, Xinyao Feng, Hongxia Ma

===================================================

Page 11: ATIS 2015 Organization Beijing, China November 4-6, 2015Professor Ding deals with Secure Key Exchange based on LWE. These two speeches are both related to Information Security, and

11

===================================================

At the 5th Meeting Room

Session Chair: Chuang Zhang

Category: Cloud Security and Applications

8:30-8:50 You Can’t Hide: A Novel Methodology to Defend DDoS Attack Based

on Botcloud Baohui Li, Wenjia Niu, Kefu Xu, Chuang Zhang, Peng Zhang

8:50-9:10 Quantitative Evaluation Method of Cloud Security Xinlong Zhao, Weishi Zhang, Wei Ma

9:10-9:30 A Large-scale Distributed Sorting Algorithm Based on Cloud

Computing Na Pang, Dali Zhu, Zheming Fan, Wenjing Rong, Weimiao Feng

9:30-9:50 Analysis and Exploit of Directory Traversal Vulnerability on Vmware Yuanyuan Bai, Zhi Chen

9:50-10:10 OpenStack Vulnerability Detection and Analysis Li Lu, Zhen Han, and Zhi Chen

10:10-10:30 Coffee Break

Session Chair: Liang Ge

Category: System Design and implementations

10:30-10:50 Decryption and Forensic System for Encrypted iPhone Backup Files

Based on Parallel Random Search Liang Ge, Lianhai Wang

10:50-11:10 The Method and System Implementation of Unstructured Data

Tracking and Forensics Guangyu Gu, Shujuan Zhang, Xuefei Wang, Xiang Cai, Sheng Chen

11:10-11:30 The Design and Implementation of Data Security Management and

Control Platform Hong Zou, Yang Qian, Yanshuai Zhao, Kun Ding

11:30-11:50 A Data Recovery Method for NTFS File Systems Zewu Peng, Xinyao Feng, Liangliang Tang, Meijie Zhai

11:50-12:10 Design and Implementation of Aircraft Pan-Tilt Control System

Based On Mobile Terminal Minghai Shao, Yingding Zhao, Jianlong Tan

Page 12: ATIS 2015 Organization Beijing, China November 4-6, 2015Professor Ding deals with Secure Key Exchange based on LWE. These two speeches are both related to Information Security, and

12

===================================================

12:00-13:00 Lunch Location: Hongguoyuan Hotel

14:00-14:30 Awards and Journal Recommendation

Location: The 4th Meeting Room

14:30-15:30 Demo Shows;Deakin University & BJTU &IIE,CAS

Location: The 4th Meeting Room

15:30-15:40 Closing Remarks ATIS-2015 Program Committee Co-Chair: Dr. Gang Li

Location: The 4th Meeting Room


Recommended